are you a hacker's target?

10
HACKER’S TARGET? ARE YOU A

Upload: blue-coat

Post on 15-May-2015

38.940 views

Category:

Technology


0 download

DESCRIPTION

Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below and let us know: how have you been a hacker’s target?

TRANSCRIPT

Page 1: Are You a Hacker's Target?

HACKER’S TARGET?A R E YO U A

Page 2: Are You a Hacker's Target?

You have a 69% chance of falling victim to cybercrime

in your lifetime

That’s almost 3 out of 4 people in countries around the world69%

Page 3: Are You a Hacker's Target?

57 MILLION AMERICANSreceive scam emails a year

1 OUT OF 3hacks originatedin the USA

47% OF IDENTITY THEFTSare perpetrated by someonethe victim knew

$8.9 MILLIONthe cost of cybercrime perbusiness in the U.S. in 2012

Page 4: Are You a Hacker's Target?

H O W D O H A C K E R SG E T YO U R I N F O R M AT I O N ?

sort through your personal computer or trash60% hack or scam

you while online25%

steal your wallet15%

click on a spam link19%

disclose financial information by accident3%

T H O S E W H O G E T T H E I R I N F O R M AT I O N S T O L E N

Page 5: Are You a Hacker's Target?

TACTICS FOR HACKING USER ACCOUNTS ONLINE

BAITINGsomeone gives you a usb drive or other electronic media that is preloaded with malware. Plug it into your computer and you’ve given them the backdoor to your personal information!

CLICKJACKINGconcealing hyperlinks beneath legitimate clickable content which, when clicked, gets you to download malware or perform actions

CROSS-SITE SCRIPTING malicious code is injected into a website you trust

DOXINGpublicly releasing a person's sensitive, identifying information, typically retrieved from social networking site profiles

Page 6: Are You a Hacker's Target?

SOCIAL ENGINEERINGstrategic use of conversation to extract information from people without giving them the feeling they are being interrogated

PHARMINGredirecting users from legitimate websites to fraudulent ones for the purpose of extracting confidential data

PHISHINGusually an email that looks like it is from a legitimate organization or person, but actually contains a link or file with malware

SPOOFINGdeceiving computers or users by hiding or faking one's identity. Email spoofing utilizes a fake email address or simulates a genuine email address

TACTICS FOR HACKING USER ACCOUNTS ONLINE (CONTINUED)

Page 7: Are You a Hacker's Target?

H O W M A N Y A C C O U N TS H AV E B E E N C O M P R O M I S E D I N S I N G L E AT TA C K S

100,000,000NETFLIX

18,000,000WORDPRESS

6,500,000

LINKEDIN

1,500,000

VISA & MASTERCARD

600,000DAILY

FACEBOOK

450,000

YAHOO250,000

TWITTER120,000

UNIVERSITIES

24,000,000ZAPPOS

Page 8: Are You a Hacker's Target?

THE MOST TARGETED WEBSITES FOR HACKERSTwitter

Facebook

Retail

Media Tech

Ecommerce

Internet Service ProviderSearch Engines

Law EnforcementGovernment

Political

Financial

1. FLORIDA 2. ARIZONA 3. CALIFORNIA

TOP STATES IN THE US THAT ARE VICTIMS OF CYBERCRIME

1. CHINA 2. BRAZIL/INDIA 3. USA

TOP COUNTRIES THAT ARE VICTIMS OF CYBERCRIME

Page 9: Are You a Hacker's Target?

use a lock or password for your computer and phones

keep your passwords at least 8 characters long and avoid using

words found in a dictionary

add one uppercase letter and a symbol to your password—it will take hackers 200 years to crack it vs. 2 hours if you

use all lowercase letters

log out of your accounts and close browser windows

Log Out

go paperless—paper bank statements are 8x more likely to be stolen than paperless statements

T I P S T O I N C R E A S E YO U R S E C U R I T Y

when you receive emails from yourbank, go directly to their website—don't

click on any links in the email

Page 10: Are You a Hacker's Target?

SOURCES:http://mashable.com/2012/06/06/6-5-million-linkedin-passwordshttp://www.cnn.com/2012/07/12/tech/web/yahoo-users-hackedhttp://www.symantec.com/about/news/release/article.jsp?prid=20110907_02https://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-riskshttp://www.cbsnews.com/8301-505124_162-57359700/zappos-hacked-24-million-accounts-at-riskhttp://www.escapistmagazine.com/forums/read/7.320322-600-000-Facebook-Accounts-Get-Hacked-Dailyhttp://www.hu�ngtonpost.com/2012/10/04/hacktivists-college-records-dump-team-ghostshell_n_1940388.htmlhttp://social4ce.com/blog/2013/02/11/social-media-bytes-hacking-social-media-hoax-and-stats-about-arab-online-usershttp://live.wsj.com/video/visa-15m-accounts-were-hacked/46E45A62-7C71-4B1A-AA98-05637A288D2A.html#!46E45A62-7C71-4B1A-AA98-05637A288D2A

BROUGHT TO YOU BY:

WWW.SOLERANETWORKS.COM